This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 01, 2020

Monday 4/27

Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams (CyberArk)

Attackers could have used a malicious GIF to scrape user’s data and ultimately take over an organization’s entire roster of Teams accounts.

https://bit.ly/2VHzxeB

Cisco and Google Cloud Partner to Bridge Applications and Networks: Announcing Cisco SD-WAN Cloud Hub with Google Cloud

This automated solution will ensure that applications and enterprise networks will be able to share service-level agreement settings, security policy, and compliance data, to provide predictable application performance and consistent user experience.

https://bit.ly/2KzApvw

Tuesday 4/28

Veeam Announces General Availability of NEW Veeam Backup for Microsoft Azure

This new offering will enable customers and service providers to move more applications and data to Azure, and to cost-effectively, securely, and easily protect cloud applications and data in Azure.

https://bit.ly/2xXpMQI

Nvidia completes ‘homerun deal’ after closing $7 billion acquisition of Mellanox

“We’re combining the leaders of AI computing and high speed networking and data processing into one company and, so, this is really quite extraordinary,” said NVIDIA CEO Jensen Huang.

https://cnb.cx/3aGZf7v

Apple Confirms New Warning Affecting Almost All iPhone Users

With iOS 12, an attacker requires the iPhone user to open a malicious email. But with iOS 13, it can be triggered unassisted simply from the Mail app being opened in the background.

https://bit.ly/2W8DMyK

Wednesday 4/29

Citrix TIPs: Deploying work-from-home solutions

From an IT perspective, will the solution we have in place to address our short-term needs be viable long term? Or do we need to re-evaluate and redesign our solutions to support permanent remote work capabilities?

https://bit.ly/35ndrl2

Security is (Still) Everyone's Responsibility (F5 Networks)

The reality is you cannot prevent any attack. You have no control over the actions of bad actors. But you can take steps to prevent a successful attack.

https://bit.ly/2yYEiYf

Thursday 4/30

WEBINAR: Validating Your Remote Infrastructure at Scale with Login VSI

https://bit.ly/2Spj5Oh

3 Myths About Security in the Cloud (Palo Alto Networks)

In order to reap all the business benefits cloud has to offer, we must ensure that myths are dispelled with both facts and action.

https://bit.ly/2Siqqis

Data Strategy Framework for Uncertain Economic Times (Pure Storage)

Pure Storage technologies overcome data gravity and significantly increase data portability. Pure’s best-in-class data-reduction technology means you have less data to move when migrating from core data centres to the cloud.

https://bit.ly/35kMT3W

Friday 5/1

NetApp scoops up virtual desktop company CloudJumper

NetApp plans to use the acquisition to bolster its desktop virtualization capabilities. NetApp's new Virtual Desktop Service (VDS) service will integrate CloudJumper's VDI and RDS technology and expand NetApp's offerings for deploying and managing virtual desktops in public clouds.

https://zd.net/2KVJajz

Security Without Barriers, Part One: A New Cyber Security Narrative (FireEye)

Because of this unbalanced threat landscape, many security leaders have adopted cyber resilience strategies. They balance investments that protect against attacks with other investments that mitigate the damage caused by attacks that get through the defenses.

https://bit.ly/35kOPJw

Pirated Movies Are Used to Distribute Malware

In the case of the campaign discovered by Microsoft Security Intelligence, the malware planted by attackers consists of coin miners. These applications are using the power of the PCs to dig up cryptocurrencies. It could very well be some malware that steals credentials or that monitors the keyboard.

https://bit.ly/2VThRgf